Skip to content

Commit

Permalink
fix wrong sigstore-root.json download url (#352)
Browse files Browse the repository at this point in the history
Signed-off-by: Richard Fan <[email protected]>
  • Loading branch information
richardfan1126 authored Nov 26, 2024
1 parent 0b02446 commit 53da8e2
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions content/en/cosign/system_config/installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,13 +147,13 @@ To do this, install and use [go-tuf](https://github.com/theupdateframework/go-tu
go install github.com/theupdateframework/go-tuf/cmd/tuf-client@latest
```

Then, obtain trusted root keys for Sigstore. You will use the 5th iteration of Sigstore's TUF root to start the root of trust, due to a backward incompatible change. The TUF client uses this root to start a chain of roots, and will download the latest, unexpired root as part of [its workflow](https://theupdateframework.github.io/specification/latest/#update-root).
Then, obtain trusted root keys for Sigstore. You will use the 10th iteration of Sigstore's TUF root to start the root of trust, due to a backward incompatible change. The TUF client uses this root to start a chain of roots, and will download the latest, unexpired root as part of [its workflow](https://theupdateframework.github.io/specification/latest/#update-root).

```bash
curl -o sigstore-root.json https://raw.githubusercontent.com/sigstore/root-signing/main/ceremony/2022-10-18/repository/5.root.json
curl -o sigstore-root.json https://raw.githubusercontent.com/sigstore/root-signing/refs/heads/main/metadata/root_history/10.root.json
```

Note that you can verify the 5th TUF root against the 1st TUF root, which was signed in a publicly documented signing ceremony. However, due to the backward incompatible change, this requires manual verification steps. See the [Sigstore root repo](https://github.com/sigstore/root-signing) for more information.
Note that you can verify the 10th TUF root against the 1st TUF root, which was signed in a publicly documented signing ceremony. However, due to the backward incompatible change, this requires manual verification steps. See the [Sigstore root repo](https://github.com/sigstore/root-signing) for more information.

#### Initializing TUF Environment

Expand Down

0 comments on commit 53da8e2

Please sign in to comment.